Securing AI Models: Understanding Threats and Testing StrategiesSecuring AI: Microsoft Shares Key Research FindingsAug 24, 2025·5 min read
Essential Information on Container Scanning: A Complete GuideDeploying applications as containers is becoming an increasingly popular approach for building, deploying, and managing software applications. The portability, scalability, and agility of containers make them an ideal solution for modern software dev...Dec 6, 2024·8 min read
Purging User Data from Azure Log Analytics Workspace - GDPR ComplianceIn today's data-driven world, ensuring compliance with data privacy regulations like the General Data Protection Regulation (GDPR) is critical for organizations. One of the key rights under GDPR is Article 17, the "Right to Erasure" or the "Right to ...Oct 4, 2024·7 min read
Creating a Simple Python App to Demonstrate CRUD Functionality using Azure FunctionsTo-Do List on Azure FunctionsAug 16, 2024·3 min read
Deploying DefectDojo on Azure Cloud with Secure PostgreSQL Integration - Complete WalkthroughDefectDojo is an open-source platform designed for DevSecOps, ASPM (Application Security Process Management), vulnerability management, and more. This guide provides step-by-step instructions to set up and configure DefectDojo on an Azure Virtual Mac...Aug 2, 2024·4 min read
How I Passed the Certified Kubernetes Administrator (CKA) Exam in 3 Months: Tips and StrategiesAchieving the Certified Kubernetes Administrator (CKA) certification within a span of three months might seem like a daunting task, but with the right resources and strategies, it's definitely feasible. In this blog, I'll share my journey and the tec...Apr 6, 2024·3 min read
Running Dockerized Trivy on AWS Lambda for Automated Security Compliance Reporting - DevSecOps ProjectIdentify AWS misconfigurations and generate AWS CIS 1.4 compliance reportsApr 5, 2024·5 min read